VizSEC C

19 papers

YearTitle / Authors
20085th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings
John R. Goodall, Gregory J. Conti, Kwan-Liu Ma
2008A Graph-Theoretic Visualization Approach to Network Risk Analysis.
Scott O'Hare, Steven Noel, Kenneth Prole
2008A Task Centered Framework for Computer Security Data Visualization.
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
2008A Term Distribution Visualization Approach to Digital Forensic String Search.
Moses Schwartz, Lorie M. Liebrock
2008BGPeep: An IP-Space Centered View for Internet Routing Data.
James Shearer, Kwan-Liu Ma, Toby Kohlenberg
2008Backhoe, a Packet Trace and Log Browser.
Sergey Bratus, Axel Hansen, Fabio Pellacini, Anna Shubina
2008Effective Visualization of File System Access-Control.
Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia
2008Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis.
Jeff Janies
2008GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool.
Leevar Williams, Richard Lippmann, Kyle Ingols
2008Improving Attack Graph Visualization through Data Reduction and Attack Grouping.
John Homer, Ashok Varikuti, Xinming Ou, Miles A. McQueen
2008Large-Scale Network Monitoring for Visual Analysis of Attacks.
Fabian Fischer, Florian Mansmann, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel
2008NetFlow Data Visualization Based on Graphs.
Pavel Minarík, Tomás Dymácek
2008Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events.
Grant Vandenberghe
2008Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization.
T. J. Jankun-Kelly, Josh Franck, David Wilson, Jeffrey C. Carver, David A. Dampier, J. Edward Swan II
2008Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts.
Shahrulniza Musa, David J. Parish
2008Visual Analysis of Program Flow Data with Data Propagation.
Ying H. Xia, Kevin D. Fairbanks, Henry L. Owen
2008Visual Reverse Engineering of Binary and Data Files.
Gregory J. Conti, Erik Dean, Matthew Sinda, Benjamin Sangster
2008Visualizing Real-Time Network Resource Usage.
Ryan Blue, Cody Dunne, Adam Fuchs, Kyle King, Aaron Schulman
2008Wireless Cyber Assets Discovery Visualization.
Kenneth Prole, John R. Goodall, Anita D. D'Amico, Jason K. Kopylec